CVE-2000-0751

mopd - Buffer Overflow

Title source: llm
STIX 2.1

Description

mopd (Maintenance Operations Protocol loader daemon) does not properly cleanse user-injected format strings, which allows remote attackers to execute arbitrary commands.

Exploits (1)

exploitdb WRITEUP VERIFIED
by r0t · textwebappsphp
https://www.exploit-db.com/exploits/26630

References (6)

Core 6
Core References
Patch, Vendor Advisory vendor-advisory x_refsource_freebsd
http://archives.neohapsis.com/archives/freebsd/2000-08/0336.html
Vendor Advisory vendor-advisory x_refsource_redhat
http://www.redhat.com/support/errata/RHSA-2000-050.html
Vendor Advisory mailing-list x_refsource_bugtraq
http://archives.neohapsis.com/archives/bugtraq/2000-08/0064.html
Various Sources vendor-advisory x_refsource_openbsd
http://www.openbsd.org/errata.html#mopd
Patch, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/1559

Scores

EPSS 0.1970
EPSS Percentile 95.5%

Details

Status published
Products (9)
netbsd/netbsd 1.4.1
netbsd/netbsd 1.4.2
openbsd/openbsd 2.4
openbsd/openbsd 2.5
openbsd/openbsd 2.6
openbsd/openbsd 2.7
redhat/linux 6.0
redhat/linux 6.1
redhat/linux 6.2
Published Oct 20, 2000
Tracked Since Feb 18, 2026